/external/chromium_org/crypto/ |
H A D | openpgp_symmetric_encryption_unittest.cc | 58 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage1), 63 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 69 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage2), 74 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 80 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage3), 85 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 91 base::StringPiece encrypted(reinterpret_cast<const char*>(kTestMessage4), 96 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testing", &out); 103 std::string encrypted = local 108 OpenPGPSymmetricEncrytion::Decrypt(encrypted, "testin [all...] |
H A D | ec_private_key_nss.cc | 225 SECKEYEncryptedPrivateKeyInfo* encrypted = PK11_ExportEncryptedPrivKeyInfo( local 233 if (!encrypted) { 243 encrypted, 245 SECKEY_DestroyEncryptedPrivateKeyInfo(encrypted, PR_TRUE);
|
H A D | encryptor_unittest.cc | 202 std::string encrypted; local 203 EXPECT_TRUE(encryptor.Encrypt(plaintext_str, &encrypted)); 205 EXPECT_EQ(ciphertext_size, encrypted.size()); 206 EXPECT_EQ(0, memcmp(encrypted.data(), ciphertext, encrypted.size())); 210 EXPECT_TRUE(encryptor.Decrypt(encrypted, &decypted)); 401 // PKCS #5 padding, encrypted.
|
/external/chromium/chrome/browser/webdata/ |
H A D | token_service_table.cc | 55 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 56 if (!encrypted) {
|
/external/chromium/third_party/libjingle/source/talk/examples/login/ |
H A D | xmppauth.cc | 55 bool encrypted) { 53 ChooseBestSaslMechanism( const std::vector<std::string> & mechanisms, bool encrypted) argument
|
/external/chromium/chrome/browser/sync/util/ |
H A D | nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, 120 std::string encrypted; local [all...] |
H A D | cryptographer_unittest.cc | 21 sync_pb::EncryptedData encrypted; local 22 encrypted.set_key_name("foo"); 23 encrypted.set_blob("bar"); 25 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer.CanDecrypt(encrypted)); 54 sync_pb::EncryptedData encrypted; local 55 EXPECT_TRUE(cryptographer.Encrypt(original, &encrypted)); 102 sync_pb::EncryptedData encrypted; local [all...] |
H A D | cryptographer.cc | 45 sync_pb::EncryptedData* encrypted) const { 46 DCHECK(encrypted); 55 encrypted->set_key_name(default_nigori_->first); 57 encrypted->mutable_blob())) { 64 bool Cryptographer::Decrypt(const sync_pb::EncryptedData& encrypted, argument 67 std::string plaintext = DecryptToString(encrypted); 72 const sync_pb::EncryptedData& encrypted) const { 73 NigoriMap::const_iterator it = nigoris_.find(encrypted.key_name()); 80 if (!it->second->Decrypt(encrypted.blob(), &plaintext)) { 87 bool Cryptographer::GetKeys(sync_pb::EncryptedData* encrypted) cons 133 SetKeys(const sync_pb::EncryptedData& encrypted) argument 144 SetPendingKeys(const sync_pb::EncryptedData& encrypted) argument [all...] |
H A D | nigori.cc | 170 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { 200 return Base64Encode(output, encrypted); 203 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { argument 205 if (!Base64Decode(encrypted, &input))
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
H A D | plainsaslhandler.h | 46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument 48 if (!encrypted && !allow_plain_) {
|
/external/chromium_org/sync/internal_api/ |
H A D | syncapi_internal.cc | 21 const sync_pb::EncryptedData& encrypted = password_specifics.encrypted(); local 24 if (!crypto->Decrypt(encrypted, data.get())) 58 // Note that we can't compare encrypted strings directly as they are seeded 62 if (!cryptographer->CanDecrypt(left.encrypted())) { 66 left_plaintext = cryptographer->DecryptToString(left.encrypted()); 71 if (!cryptographer->CanDecrypt(right.encrypted())) { 75 right_plaintext = cryptographer->DecryptToString(right.encrypted());
|
/external/chromium_org/sync/util/ |
H A D | cryptographer_unittest.cc | 35 sync_pb::EncryptedData encrypted; local 36 encrypted.set_key_name("foo"); 37 encrypted.set_blob("bar"); 39 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 45 sync_pb::EncryptedData encrypted; local 47 EXPECT_FALSE(cryptographer_.Encrypt(original, &encrypted)); 55 sync_pb::EncryptedData encrypted; local 56 encrypted.set_key_name("foo"); 57 encrypted.set_blob("bar"); 59 EXPECT_FALSE(cryptographer_.CanDecrypt(encrypted)); 72 sync_pb::EncryptedData encrypted; local 91 sync_pb::EncryptedData encrypted; local 149 sync_pb::EncryptedData encrypted; local 199 sync_pb::EncryptedData encrypted; local [all...] |
H A D | nigori_unittest.cc | 70 std::string encrypted = local 75 EXPECT_TRUE(nigori.Decrypt(encrypted, &plaintext)); 87 std::string encrypted; local 88 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 91 EXPECT_TRUE(nigori.Decrypt(encrypted, &decrypted)); 102 std::string encrypted; local 103 EXPECT_TRUE(nigori.Encrypt(plaintext, &encrypted)); 106 encrypted[0] = (encrypted[0] == 'a' ? 'b' : 'a'); 109 EXPECT_TRUE(nigori.Decrypt(encrypted, 120 std::string encrypted; local [all...] |
H A D | nigori.cc | 157 bool Nigori::Encrypt(const std::string& value, std::string* encrypted) const { 189 return Base64Encode(output, encrypted); 192 bool Nigori::Decrypt(const std::string& encrypted, std::string* value) const { argument 194 if (!Base64Decode(encrypted, &input))
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | plainsaslhandler.h | 46 virtual std::string ChooseBestSaslMechanism(const std::vector<std::string> & mechanisms, bool encrypted) { argument 48 if (!encrypted && !allow_plain_) {
|
H A D | xmppauth.cc | 63 bool encrypted) { 61 ChooseBestSaslMechanism( const std::vector<std::string>& mechanisms, bool encrypted) argument
|
/external/chromium_org/chrome/browser/webdata/ |
H A D | token_service_table.cc | 75 bool encrypted = Encryptor::EncryptString(token, &encrypted_token); local 76 if (!encrypted) {
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_constants.h | 182 namespace encrypted { namespace in namespace:chromeos::onc 194 } // namespace encrypted
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/mp4/samplegrouping/ |
H A D | CencSampleEncryptionInformationGroupEntry.java | 64 public void setEncrypted(int encrypted) { argument 65 isEncrypted = encrypted;
|
/external/chromium_org/jingle/notifier/base/ |
H A D | gaia_token_pre_xmpp_auth.cc | 103 const std::vector<std::string> & mechanisms, bool encrypted) { 102 ChooseBestSaslMechanism( const std::vector<std::string> & mechanisms, bool encrypted) argument
|
/external/lzma/CPP/7zip/UI/Console/ |
H A D | ExtractCallbackConsole.cpp | 43 static const char *kCrcFailedEncrypted = "CRC Failed in encrypted file. Wrong password?";
45 static const char *kDataErrorEncrypted = "Data Error in encrypted file. Wrong password?";
108 STDMETHODIMP CExtractCallbackConsole::SetOperationResult(Int32 operationResult, bool encrypted)
argument 125 (*OutStream) << (encrypted ? kCrcFailedEncrypted: kCrcFailed);
128 (*OutStream) << (encrypted ? kDataErrorEncrypted : kDataError);
168 HRESULT CExtractCallbackConsole::OpenResult(const wchar_t * /* name */, HRESULT result, bool encrypted)
argument 176 (*OutStream) << (encrypted ?
177 "Can not open encrypted archive. Wrong password?" :
|
/external/chromium_org/content/renderer/media/crypto/ |
H A D | ppapi_decryptor.cc | 154 const scoped_refptr<media::DecoderBuffer>& encrypted, 159 stream_type, encrypted, decrypt_cb)); 164 if (!plugin_cdm_delegate_->Decrypt(stream_type, encrypted, decrypt_cb)) 216 const scoped_refptr<media::DecoderBuffer>& encrypted, 221 encrypted, audio_decode_cb)); 226 if (!plugin_cdm_delegate_->DecryptAndDecodeAudio(encrypted, audio_decode_cb)) 231 const scoped_refptr<media::DecoderBuffer>& encrypted, 236 encrypted, video_decode_cb)); 241 if (!plugin_cdm_delegate_->DecryptAndDecodeVideo(encrypted, video_decode_cb)) 152 Decrypt( StreamType stream_type, const scoped_refptr<media::DecoderBuffer>& encrypted, const DecryptCB& decrypt_cb) argument 215 DecryptAndDecodeAudio( const scoped_refptr<media::DecoderBuffer>& encrypted, const AudioDecodeCB& audio_decode_cb) argument 230 DecryptAndDecodeVideo( const scoped_refptr<media::DecoderBuffer>& encrypted, const VideoDecodeCB& video_decode_cb) argument
|
/external/chromium_org/media/cdm/ |
H A D | aes_decryptor_unittest.cc | 31 // |encrypted_data| is encrypted from |plain_text| using |key|. |key_id| is 46 // Frames 0 & 1 are encrypted with the same key. Frame 2 is encrypted with a 136 // kSubsampleOriginalData encrypted with kSubsampleKey and kSubsampleIv using 152 // kSubsampleOriginalData encrypted with kSubsampleKey and kSubsampleIv but 195 // Creates a WebM encrypted buffer that the demuxer would pass to the 196 // decryptor. |data| is the payload of a WebM encrypted Block. |key_id| is 197 // initialization data from the WebM file. Every encrypted Block has 198 // a signal byte prepended to a frame. If the frame is encrypted then an IV is 199 // prepended to the Block. Current encrypted Web 293 DecryptAndExpectToSucceed(const scoped_refptr<DecoderBuffer>& encrypted, const uint8* plain_text, int plain_text_size) argument 305 DecryptAndExpectDataMismatch( const scoped_refptr<DecoderBuffer>& encrypted, const uint8* plain_text, int plain_text_size) argument 318 DecryptAndExpectSizeDataMismatch( const scoped_refptr<DecoderBuffer>& encrypted, const uint8* plain_text, int plain_text_size) argument 331 DecryptAndExpectToFail(const scoped_refptr<DecoderBuffer>& encrypted) argument [all...] |
/external/chromium_org/media/filters/ |
H A D | video_frame_stream_unittest.cc | 87 const scoped_refptr<DecoderBuffer>& encrypted, 91 encrypted->data(), encrypted->data_size()); 92 decrypted->set_timestamp(encrypted->timestamp()); 93 decrypted->set_duration(encrypted->duration()); 86 Decrypt(Decryptor::StreamType stream_type, const scoped_refptr<DecoderBuffer>& encrypted, const Decryptor::DecryptCB& decrypt_cb) argument
|
/external/chromium_org/net/quic/ |
H A D | quic_packet_creator.cc | 234 QuicEncryptedPacket* encrypted = local 236 DCHECK(encrypted); 237 DCHECK_GE(options_.max_packet_length, encrypted->length()); 238 return encrypted;
|